Securing Docker Container Workloads
Docker containers are a mainstream mechanism for application delivery, and securing the container workload is vital. This course will give you the knowledge and techniques you need for securing containerized software applications.
Packaging, distributing, and running software applications in containers is no longer a pastime just for early adopters. Containers are mainstream, and with that comes a concern about the security and integrity of containers as an application delivery mechanism. In this course, Securing Docker Container Workloads, you’ll learn how to secure your application workloads from the perspective of the container itself. First, you’ll learn about the Linux security mechanisms that go together to create the abstract concept of the container, and how they work together to ensure that containers are good neighbors. Next, you’ll explore the privileges that are available to container workloads, and how you can adopt and apply the principle of least privilege to reduce the risk of privilege escalation. Finally, you’ll see how to minimize the attack surface available from within a container by limiting the access it has to the kernel and other system objects. By the end of this course, you’ll be equipped with the knowledge and techniques necessary for securing your Docker container workloads.
Author Name: Nigel Brown
Author Description:
Nigel is an IT professional with over 25 years of experience, gained in technical and management roles. He started his career in IT Operations, before co-founding and leading a company focused on delivering systems management solutions to some of the UK’s largest companies. Recently, he has returned to his technical roots, and swapped the world of proprietary software for the open source domain. Nigel has an avid interest in the contemporary domain of microservices and container technologies. In… more
Table of Contents
- Course Overview
1min - Isolating Container Workloads with Linux Namespaces
27mins - Controlling Access to Resources Using Control Groups
34mins - Managing the Privileges Available to a Container Workload
44mins - Limiting the System Calls Available to Container Workloads
36mins - Implementing Access Control for Container Workloads
48mins
There are no reviews yet.